ID CVE-2003-0686
Summary Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
References
Vulnerable Configurations
  • cpe:2.3:a:dave_airlie:pam_smb:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dave_airlie:pam_smb:2.0_rc4:*:*:*:*:*:*:*
    cpe:2.3:a:dave_airlie:pam_smb:2.0_rc4:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:pam_smb:1.1.6-2:*:i386:*:*:*:*:*
    cpe:2.3:a:redhat:pam_smb:1.1.6-2:*:i386:*:*:*:*:*
  • cpe:2.3:a:redhat:pam_smb:1.1.6-2:*:ia64:*:*:*:*:*
    cpe:2.3:a:redhat:pam_smb:1.1.6-2:*:ia64:*:*:*:*:*
  • cpe:2.3:a:redhat:pam_smb:1.1.6-5:*:i386:*:*:*:*:*
    cpe:2.3:a:redhat:pam_smb:1.1.6-5:*:i386:*:*:*:*:*
  • cpe:2.3:a:redhat:pam_smb:1.1.6-7:*:i386:*:*:*:*:*
    cpe:2.3:a:redhat:pam_smb:1.1.6-7:*:i386:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-05-2018 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2007-04-25T19:52:32.853-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
family unix
id oval:org.mitre.oval:def:469
status accepted
submitted 2003-09-05T12:00:00.000-04:00
title Buffer Overflow in PAM SMB Module
version 36
redhat via4
advisories
  • rhsa
    id RHSA-2003:261
  • rhsa
    id RHSA-2003:262
refmap via4
bugtraq 20030901 GLSA: pam_smb (200309-01)
cert-vn VU#680260
conectiva CLA-2003:734
confirm http://us2.samba.org/samba/ftp/pam_smb/
debian DSA-374
secunia 9611
suse SuSE-SA:2003:036
turbo TLSA-2003-50
Last major update 03-05-2018 - 01:29
Published 20-10-2003 - 04:00
Last modified 03-05-2018 - 01:29
Back to Top